Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Chris Thomas explores how shifting consumer attitudes to fraud post-pandemic are creating new risks for e-commerce. Learn strategies to balance user experience and fraud prevention. Take action now to safeguard your business.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Shivani Rai Gupta, Arvind Sivaramakrishnan, Siva Adhikarla, Raman Srinivasan and Saraswathi Ramachandra explore measuring AI impact beyond traditional ROI across retail, healthcare and technology sectors.
Krishnan Venkateswaran shares Titan’s journey of integrating supply chain discipline, omnichannel systems and data-driven innovation to create customer-obsessed, future-ready retail experiences.
Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.
Join Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
Andrew Becherer analyzes how generative AI is enabling attackers to conduct sophisticated spear-phishing campaigns at unprecedented scale, and shares defense strategies to protect financial institutions from AI-powered threats.
Chris Wysopal shares critical findings from the latest software security and AI reports for financial services, offering actionable recommendations to enhance security practices and address emerging vulnerabilities.
Imran Khan examines the latest supply chain attack tactics, revealing hidden vulnerabilities in vendor relationships and third-party dependencies that can lead to catastrophic breaches in financial services.
Aaron Jensen reveals critical vulnerabilities in non-production environments most organizations overlook and shares strategies to secure test, development and backup data containing sensitive information.
Michael Monte demonstrates how AI agents can modernize security operations beyond basic automation, strengthening detection capabilities and bridging the gap between traditional security operations and modern data analytics.
Scott Tenenbaum, David Anderson and Kimberly Pack examine how to quantify cyber risk exposure, liability and resilience, helping financial institutions make informed decisions about insurance, governance and risk transfer.
Sandeep Bhide challenges traditional third-party risk assessment methods, advocating for a data-first approach that reduces questionnaire burden while improving risk visibility and decision-making in vendor management.
Tim Hill provides practical guidance on navigating New York's 23 NYCRR 500 cybersecurity regulations, offering strategies for financial institutions to achieve compliance while modernizing their security infrastructure.
Sean Doherty demonstrates how security can shift from being a business constraint to a competitive advantage, enabling financial services organizations to accelerate growth while maintaining robust protection.
Chris Young explores strategies for defending against insider threats through data resilience measures and endpoint control, helping financial institutions protect sensitive information from internal risks.
Vincent Stoffer explains why network detection and response capabilities are essential for financial institutions, addressing today's complex threat landscape and visibility challenges across modern networks.
Vlad Brodsky, Steve Lenderman and Josh Cigna discuss the journey toward passwordless authentication, covering phishing-resistant protocols, passkey adoption, FIDO2 deployment at scale and practical implementation strategies.
Sanjit Ganguli examines how zero trust architecture must evolve to address AI-driven threats in financial services, sharing strategies for network transformation and emerging security paradigms in the age of artificial intelligence.
Moriah Hara and Hardik Mehta explore practical AI implementation in financial services, cutting through industry hype to reveal real-world applications, risk management strategies and governance frameworks that protect institutions.
Imran Ahmad and Ruth Promislow discuss how financial institutions can strengthen cyber resilience through defensible documentation, multi-jurisdictional compliance and cultural integration of security across business functions.
Anton Chuvakin examines how secure AI evolved from 2022's experimental chaos to 2025's production reality, covering the four-layer security framework, practical use cases and emerging governance challenges around agentic AI and resilience.
Neal Jardine and Karen Continenza explore how cyber insurance evolved into a business necessity, covering expanded coverages, ransomware trends, the importance of insurer-friendly vendor alignment and regulatory developments shaping 2026.
Sunil Chand discusses what it takes to succeed as a modern CISO, from asking tough questions about reporting structures and legal coverage to translating technical risks into business language and planning career progression.
Sean Mack shares how DevSecOps transforms security from obstacle to competitive advantage by embedding protection into development workflows, enabling teams to move faster while reducing risk through proper road maps and guardrails.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Martin Covill of iPSL examines how U.K. financial institutions can align cybersecurity strategy with evolving regulations while building board-level support and proactive defense capabilities.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Patrick Beckman Lapré explores how financial institutions can embed compliance into PKI and digital trust strategies, navigating multi-regulatory obligations through automation and centralized management.
John Nayagam and Don Gibson examine how financial institutions can move beyond compliance theater to risk-based supplier assessment while extending zero trust principles to third-party relationships.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
Gurps Khaira explores how Britain's financial sector can overcome the challenge of balancing regulatory compliance with rapid threat response through strategic change management and sustainable security cultures.
Becky Pinkard analyzes how frameworks such as DORA are driving financial institutions toward proactive resilience strategies, yet basic security fundamentals still represent their greatest vulnerabilities.
Sam Goddard and William Dixon explore how financial institutions can build cyber resilience through strategic threat intelligence and by elevating cybersecurity leadership from operational to strategic capability.
Peter Crumpton, Chris Denbigh-White and Heather Lowrie discuss how financial services can transform regulatory compliance from operational overhead into competitive advantage through strategic communication and consumer trust.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
1 2 3 4 5 6 7 8 9 Next